Full AWS Practitioner Certification Question

Which Bluetooth attack might be used to load malware onto a device?